Skip to main content
  • Conference proceedings
  • © 2015

Detection of Intrusions and Malware, and Vulnerability Assessment

12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9148)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Conference proceedings info: DIMVA 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

    Pages I-XII
  2. Attacks

    1. Front Matter

      Pages 1-1
    2. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks

      • Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda
      Pages 3-24
    3. “Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Them

      • Bernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos
      Pages 25-45
    4. C5: Cross-Cores Cache Covert Channel

      • Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon
      Pages 46-64
  3. Attack Detection

    1. Front Matter

      Pages 65-65
    2. Intrusion Detection for Airborne Communication Using PHY-Layer Information

      • Martin Strohmeier, Vincent Lenders, Ivan Martinovic
      Pages 67-77
    3. That Ain’t You: Blocking Spearphishing Through Behavioral Modelling

      • Gianluca Stringhini, Olivier Thonnard
      Pages 78-97
    4. Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics

      • Tobias Wüchner, Martín Ochoa, Alexander Pretschner
      Pages 98-118
  4. Binary Analysis and Mobile Malware Protection

    1. Front Matter

      Pages 119-119
    2. Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries

      • Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero
      Pages 121-143
    3. Fine-Grained Control-Flow Integrity Through Binary Hardening

      • Mathias Payer, Antonio Barresi, Thomas R. Gross
      Pages 144-164
    4. Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software

      • Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis
      Pages 165-184
  5. Social Networks and Large-Scale Attacks

    1. Front Matter

      Pages 185-185
    2. The Role of Cloud Services in Malicious Software: Trends and Insights

      • Xiao Han, Nizar Kheir, Davide Balzarotti
      Pages 187-204
    3. Capturing DDoS Attack Dynamics Behind the Scenes

      • An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen
      Pages 205-215
    4. Quit Playing Games with My Heart: Understanding Online Dating Scams

      • JingMin Huang, Gianluca Stringhini, Peng Yong
      Pages 216-236
  6. Web and Mobile Security

    1. Front Matter

      Pages 237-237
    2. More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations

      • Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin Butler
      Pages 239-260
    3. May I? - Content Security Policy Endorsement for Browser Extensions

      • Daniel Hausknecht, Jonas Magazinius, Andrei Sabelfeld
      Pages 261-281

Other Volumes

  1. Detection of Intrusions and Malware, and Vulnerability Assessment

About this book

This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015.
The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.

Editors and Affiliations

  • Chalmers University of Technology, Gothenburg, Sweden

    Magnus Almgren, Vincenzo Gulisano

  • Politecnico di Milano, Milan, Italy

    Federico Maggi

Bibliographic Information

  • Book Title: Detection of Intrusions and Malware, and Vulnerability Assessment

  • Book Subtitle: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

  • Editors: Magnus Almgren, Vincenzo Gulisano, Federico Maggi

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-20550-2

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2015

  • Softcover ISBN: 978-3-319-20549-6Published: 06 July 2015

  • eBook ISBN: 978-3-319-20550-2Published: 22 June 2015

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XII, 351

  • Number of Illustrations: 98 b/w illustrations

  • Topics: Systems and Data Security, e-Commerce/e-business, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access